Technology Elastic report: Nearly 33% of cloud cyber-attacks use credential...

Elastic report: Nearly 33% of cloud cyber-attacks use credential access

-

Watch the Low-Code/No-Code Summit on-demand sessions to learn how to successfully innovate and achieve efficiencies by upskilling and scaling citizen developers. Watch now.


The 2022 Elastic Global Threat Report found that nearly 33% of cloud-based attacks leverage credentials, indicating that users often overestimate the security of their cloud environments and, as a result, fail to adequately configure and protect them.

>>Don’t miss our new special issue: Zero trust: the new security paradigm.<

Key findings for the report focus on three primary trends: the role of human error in increasing cloud security risks, malicious use of commercial software, and endpoint attacks becoming more diverse due to the high effectiveness of most endpoint security software.

And while commercial adversary simulation software such as Cobalt Strike is useful for the defense of their environment by many teams, but also used as a malicious tool for massive malware implantation.

Event

Intelligent security stop

On December 8, learn about the critical role of AI and ML in cybersecurity and industry-specific case studies. Register for your free pass today.

register now

Other findings from the Elastic report include:

Image source: Elastic.
  • 54% of all malware infections occurred on Windows endpoints, while 39% were on Linux endpoints.
  • The largest contributor of Linux-based malware/payloads was Meterpreter at 14%, followed by Gafgyt at 12% and Mirai at 10%.
  • CobaltStrike was the most popular malicious binary or payload for Windows endpoints with 35% of all detections, followed by AgentTesla at 25% and RedLineStealer at 10%.

Finally, more than 50 endpoint infiltration techniques are used by threat actors, suggesting that endpoint protection works well as its sophistication requires threat actors to constantly find new or new attack methods to be successful.

Methodology

The report was created by elastic security labsthe company’s threat research, malware analysis, and detection engineering team, and compiled using telemetry from global deployments of Elastic Security from August 2021 to August 2022.

Read the full report of elastic.

VentureBeat’s mission is to become a digital city plaza where tech decision makers can learn about transformative business technology and execute transactions. Discover our Briefings.

Shreya Christinahttp://ukbusinessupdates.com
Shreya has been with ukbusinessupdates.com for 3 years, writing copy for client websites, blog posts, EDMs and other mediums to engage readers and encourage action. By collaborating with clients, our SEO manager and the wider ukbusinessupdates.com team, Shreya seeks to understand an audience before creating memorable, persuasive copy.

Latest news

1xbet App ᐉ Скачать 1xbet Mobile 1xbet Apk Android & Ios ᐉ My 1xbet Co

1xbet App ᐉ Скачать 1xbet Mobile 1xbet Apk Android & Ios ᐉ My 1xbet Com1xbet Официальное Приложение Скачать и...

Вулкан Вегас официальному Сайт: Автоматы в Деньги В Vulkan Vega

Вулкан Вегас официальному Сайт: Автоматы в Деньги В Vulkan VegasЛучшие Сайты Онлайн-слотов В 2024 году Игры На Игровые Автоматы...

Comment jouer au RDR2 Poker Un guide pour gagner au RDR2 Poker

Fort heureusement, vous pouvez sauvegarder entre chaque parties gagnées et quitter la table en cours de partie dans modifier...

comment ouvrir un casino 653756

Elle garantit que le casino opère selon des normes établies pour protéger les joueurs, garantir des jeux équitables et...

Royal Ace Casino Review Updated for April 2024

Nous sommes un annuaire indépendant et un réviseur de casinos en ligne, un forum sur les casinos et un...

Red Dead Redemption 2, comment tricher au poker

Lorsque vous jouez contre des joueurs expérimentés, cela les empêche d'apprendre votre style et de prédire vos décisions. Une...

Must read

You might also likeRELATED
Recommended to you